Commit 2da2528e authored by nitro's avatar nitro Committed by GitHub

Transit encryption enabled default to true with docs (#111)

* Default transit_encryption_enabled to true due to bridgecrew

* Update README.yaml

* Auto Format

* Trigger validate-codeowners
Co-authored-by: default avatarcloudpossebot <11232728+cloudpossebot@users.noreply.github.com>
Co-authored-by: default avatarPePe Amengual <jose.amengual@gmail.com>
parent 96f4e487
...@@ -94,17 +94,18 @@ the registry shows many of our inputs as required when in fact they are optional ...@@ -94,17 +94,18 @@ the registry shows many of our inputs as required when in fact they are optional
The table below correctly indicates which inputs are required. The table below correctly indicates which inputs are required.
Note that this uses secure defaults. One of the ways this module can trip users up is with `transit_encryption_enabled` which is `true` by default. With this enabled, one does not simply `redis-cli` in without setting up an `stunnel`. Amazon provides [good docs on how to connect with it enabled](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls). If this is not desired behavior, set `transit_encryption_enabled=false`.
For a complete example, see [examples/complete](examples/complete). For a complete example, see [examples/complete](examples/complete).
For automated tests of the complete example using [bats](https://github.com/bats-core/bats-core) and [Terratest](https://github.com/gruntwork-io/terratest) (which tests and deploys the example on AWS), see [test](test). For automated tests of the complete example using [bats](https://github.com/bats-core/bats-core) and [Terratest](https://github.com/gruntwork-io/terratest) (which tests and deploys the example on AWS), see [test](test).
```hcl ```hcl
provider "aws" { provider "aws" {
region = var.region region = var.region
} }
module "vpc" { module "vpc" {
source = "cloudposse/vpc/aws" source = "cloudposse/vpc/aws"
# Cloud Posse recommends pinning every module to a specific version # Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x" # version = "x.x.x"
...@@ -112,9 +113,9 @@ For automated tests of the complete example using [bats](https://github.com/bats ...@@ -112,9 +113,9 @@ For automated tests of the complete example using [bats](https://github.com/bats
stage = var.stage stage = var.stage
name = var.name name = var.name
cidr_block = "172.16.0.0/16" cidr_block = "172.16.0.0/16"
} }
module "subnets" { module "subnets" {
source = "cloudposse/dynamic-subnets/aws" source = "cloudposse/dynamic-subnets/aws"
# Cloud Posse recommends pinning every module to a specific version # Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x" # version = "x.x.x"
...@@ -127,9 +128,9 @@ For automated tests of the complete example using [bats](https://github.com/bats ...@@ -127,9 +128,9 @@ For automated tests of the complete example using [bats](https://github.com/bats
cidr_block = module.vpc.vpc_cidr_block cidr_block = module.vpc.vpc_cidr_block
nat_gateway_enabled = true nat_gateway_enabled = true
nat_instance_enabled = false nat_instance_enabled = false
} }
module "redis" { module "redis" {
source = "cloudposse/elasticache-redis/aws" source = "cloudposse/elasticache-redis/aws"
# Cloud Posse recommends pinning every module to a specific version # Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x" # version = "x.x.x"
...@@ -156,7 +157,7 @@ For automated tests of the complete example using [bats](https://github.com/bats ...@@ -156,7 +157,7 @@ For automated tests of the complete example using [bats](https://github.com/bats
value = "lK" value = "lK"
} }
] ]
} }
``` ```
...@@ -267,7 +268,7 @@ Available targets: ...@@ -267,7 +268,7 @@ Available targets:
| stage | Stage, e.g. 'prod', 'staging', 'dev', OR 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no | | stage | Stage, e.g. 'prod', 'staging', 'dev', OR 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no |
| subnets | Subnet IDs | `list(string)` | `[]` | no | | subnets | Subnet IDs | `list(string)` | `[]` | no |
| tags | Additional tags (e.g. `map('BusinessUnit','XYZ')` | `map(string)` | `{}` | no | | tags | Additional tags (e.g. `map('BusinessUnit','XYZ')` | `map(string)` | `{}` | no |
| transit\_encryption\_enabled | Whether to enable encryption in transit. If this is enabled, use the [following guide](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls) to access redis | `bool` | `null` | no | | transit\_encryption\_enabled | Whether to enable encryption in transit. If this is enabled, use the [following guide](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls) to access redis | `bool` | `true` | no |
| use\_existing\_security\_groups | Flag to enable/disable creation of Security Group in the module. Set to `true` to disable Security Group creation and provide a list of existing security Group IDs in `existing_security_groups` to place the cluster into | `bool` | `false` | no | | use\_existing\_security\_groups | Flag to enable/disable creation of Security Group in the module. Set to `true` to disable Security Group creation and provide a list of existing security Group IDs in `existing_security_groups` to place the cluster into | `bool` | `false` | no |
| vpc\_id | VPC ID | `string` | n/a | yes | | vpc\_id | VPC ID | `string` | n/a | yes |
| zone\_id | Route53 DNS Zone ID | `string` | `""` | no | | zone\_id | Route53 DNS Zone ID | `string` | `""` | no |
...@@ -414,8 +415,8 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply ...@@ -414,8 +415,8 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply
### Contributors ### Contributors
<!-- markdownlint-disable --> <!-- markdownlint-disable -->
| [![Erik Osterman][osterman_avatar]][osterman_homepage]<br/>[Erik Osterman][osterman_homepage] | [![Igor Rodionov][goruha_avatar]][goruha_homepage]<br/>[Igor Rodionov][goruha_homepage] | [![Andriy Knysh][aknysh_avatar]][aknysh_homepage]<br/>[Andriy Knysh][aknysh_homepage] | [![Daren Desjardins][darend_avatar]][darend_homepage]<br/>[Daren Desjardins][darend_homepage] | [![Max Moon][MoonMoon1919_avatar]][MoonMoon1919_homepage]<br/>[Max Moon][MoonMoon1919_homepage] | [![Christopher Riley][christopherriley_avatar]][christopherriley_homepage]<br/>[Christopher Riley][christopherriley_homepage] | | [![Erik Osterman][osterman_avatar]][osterman_homepage]<br/>[Erik Osterman][osterman_homepage] | [![Igor Rodionov][goruha_avatar]][goruha_homepage]<br/>[Igor Rodionov][goruha_homepage] | [![Andriy Knysh][aknysh_avatar]][aknysh_homepage]<br/>[Andriy Knysh][aknysh_homepage] | [![Daren Desjardins][darend_avatar]][darend_homepage]<br/>[Daren Desjardins][darend_homepage] | [![Max Moon][MoonMoon1919_avatar]][MoonMoon1919_homepage]<br/>[Max Moon][MoonMoon1919_homepage] | [![Christopher Riley][christopherriley_avatar]][christopherriley_homepage]<br/>[Christopher Riley][christopherriley_homepage] | [![RB][nitrocode_avatar]][nitrocode_homepage]<br/>[RB][nitrocode_homepage] |
|---|---|---|---|---|---| |---|---|---|---|---|---|---|
<!-- markdownlint-restore --> <!-- markdownlint-restore -->
[osterman_homepage]: https://github.com/osterman [osterman_homepage]: https://github.com/osterman
...@@ -430,6 +431,8 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply ...@@ -430,6 +431,8 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply
[MoonMoon1919_avatar]: https://img.cloudposse.com/150x150/https://github.com/MoonMoon1919.png [MoonMoon1919_avatar]: https://img.cloudposse.com/150x150/https://github.com/MoonMoon1919.png
[christopherriley_homepage]: https://github.com/christopherriley [christopherriley_homepage]: https://github.com/christopherriley
[christopherriley_avatar]: https://img.cloudposse.com/150x150/https://github.com/christopherriley.png [christopherriley_avatar]: https://img.cloudposse.com/150x150/https://github.com/christopherriley.png
[nitrocode_homepage]: https://github.com/nitrocode
[nitrocode_avatar]: https://img.cloudposse.com/150x150/https://github.com/nitrocode.png
[![README Footer][readme_footer_img]][readme_footer_link] [![README Footer][readme_footer_img]][readme_footer_link]
[![Beacon][beacon]][website] [![Beacon][beacon]][website]
......
...@@ -45,6 +45,7 @@ description: |- ...@@ -45,6 +45,7 @@ description: |-
# How to use this project # How to use this project
usage: |- usage: |-
Note that this uses secure defaults. One of the ways this module can trip users up is with `transit_encryption_enabled` which is `true` by default. With this enabled, one does not simply `redis-cli` in without setting up an `stunnel`. Amazon provides [good docs on how to connect with it enabled](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls). If this is not desired behavior, set `transit_encryption_enabled=false`.
For a complete example, see [examples/complete](examples/complete). For a complete example, see [examples/complete](examples/complete).
...@@ -131,3 +132,5 @@ contributors: ...@@ -131,3 +132,5 @@ contributors:
github: "MoonMoon1919" github: "MoonMoon1919"
- name: "Christopher Riley" - name: "Christopher Riley"
github: "christopherriley" github: "christopherriley"
- name: "RB"
github: "nitrocode"
...@@ -85,7 +85,7 @@ ...@@ -85,7 +85,7 @@
| stage | Stage, e.g. 'prod', 'staging', 'dev', OR 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no | | stage | Stage, e.g. 'prod', 'staging', 'dev', OR 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no |
| subnets | Subnet IDs | `list(string)` | `[]` | no | | subnets | Subnet IDs | `list(string)` | `[]` | no |
| tags | Additional tags (e.g. `map('BusinessUnit','XYZ')` | `map(string)` | `{}` | no | | tags | Additional tags (e.g. `map('BusinessUnit','XYZ')` | `map(string)` | `{}` | no |
| transit\_encryption\_enabled | Whether to enable encryption in transit. If this is enabled, use the [following guide](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls) to access redis | `bool` | `null` | no | | transit\_encryption\_enabled | Whether to enable encryption in transit. If this is enabled, use the [following guide](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls) to access redis | `bool` | `true` | no |
| use\_existing\_security\_groups | Flag to enable/disable creation of Security Group in the module. Set to `true` to disable Security Group creation and provide a list of existing security Group IDs in `existing_security_groups` to place the cluster into | `bool` | `false` | no | | use\_existing\_security\_groups | Flag to enable/disable creation of Security Group in the module. Set to `true` to disable Security Group creation and provide a list of existing security Group IDs in `existing_security_groups` to place the cluster into | `bool` | `false` | no |
| vpc\_id | VPC ID | `string` | n/a | yes | | vpc\_id | VPC ID | `string` | n/a | yes |
| zone\_id | Route53 DNS Zone ID | `string` | `""` | no | | zone\_id | Route53 DNS Zone ID | `string` | `""` | no |
......
...@@ -92,7 +92,7 @@ variable "at_rest_encryption_enabled" { ...@@ -92,7 +92,7 @@ variable "at_rest_encryption_enabled" {
variable "transit_encryption_enabled" { variable "transit_encryption_enabled" {
type = bool type = bool
default = null default = true
description = "Whether to enable encryption in transit. If this is enabled, use the [following guide](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls) to access redis" description = "Whether to enable encryption in transit. If this is enabled, use the [following guide](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html#connect-tls) to access redis"
} }
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment